By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Cryptocurrency Miner and Clipper Malware Spread via SourceForge Cracked Software Listings
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Cryptocurrency Miner and Clipper Malware Spread via SourceForge Cracked Software Listings
Computing

Cryptocurrency Miner and Clipper Malware Spread via SourceForge Cracked Software Listings

News Room
Last updated: 2025/04/08 at 2:09 PM
News Room Published 8 April 2025
Share
SHARE

Threat actors have been observed distributing malicious payloads such as cryptocurrency miner and clipper malware via SourceForge, a popular software hosting service, under the guise of cracked versions of legitimate applications like Microsoft Office.

“One such project, officepackage, on the main website sourceforge.net, appears harmless enough, containing Microsoft Office add-ins copied from a legitimate GitHub project,” Kaspersky said in a report published today. “The description and contents of officepackage provided below were also taken from GitHub.”

While every project created on sourceforge.net gets assigned a “<project>.sourceforge.io” domain name, the Russian cybersecurity company found that the domain for officepackage, “officepackage.sourceforge[.]io,” displays a long list of Microsoft Office applications and corresponding links to download them in Russian.

On top of that, hovering over the download button reveals a seemingly legitimate URL in the browser status bar: “loading.sourceforge[.]io/download, giving the impression that the download link is associated with SourceForge. However, clicking on the link redirects the user to a completely different page hosted on “taplink[.]cc” that prominently displays another Download button.

Should victims click on the download button, they are served a 7 MB ZIP archive (“vinstaller.zip”), which, when opened, contains a second password-protected archive (“installer.zip”) and a text file with the password to open the file.

Cybersecurity

Present within the new ZIP file is an MSI installer that’s responsible for creating several files, a console archive utility called “UnRAR.exe,” a RAR archive, and a Visual Basic (VB) script.

“The VB script runs a PowerShell interpreter to download and execute a batch file, confvk, from GitHub,” Kaspersky said. “This file contains the password for the RAR archive. It also unpacks malicious files and runs the next-stage script.”

The batch file is also designed to run two PowerShell scripts, one of which sends system metadata using the Telegram API. The other file downloads another batch script that then acts on the contents of the RAR archive, ultimately launching the miner and clipper malware (aka ClipBanker) payloads.

Also dropped is the netcat executable (“ShellExperienceHost.exe”) that establishes an encrypted connection with a remote server. That’s not all. The confvk batch file has been found to create another file named “ErrorHandler.cmd” that contains a PowerShell script programmed to retrieve and execute a text string through the Telegram API.

The fact that the website has a Russian interface indicates a focus on Russian-speaking users. Telemetry data shows that 90% of potential victims are in Russia, with 4,604 users encountering the scheme between early January and late March.

With the sourceforge[.]io pages indexed by search engines and appearing in search results, it’s believed that Russian users searching for Microsoft Office on Yandex are likely the target of the campaign.

“As users seek ways to download applications outside official sources, attackers offer their own,” Kaspersky said. “While the attack primarily targets cryptocurrency by deploying a miner and ClipBanker, the attackers could sell system access to more dangerous actors.”

The disclosure comes as the company revealed details of a campaign that’s distributing a malware downloader called TookPS via fraudulent sites impersonating the DeepSeek artificial intelligence (AI) chatbot, as well as remote desktop and 3D modeling software.

This includes websites like deepseek-ai-soft[.]com, to which unsuspecting users are redirected to via sponsored Google search results, per Malwarebytes.

Cybersecurity

TookPS is engineered to download and execute PowerShell scripts that grant remote access to the infected host via SSH, and drop a modified version of a trojan dubbed TeviRat. This highlights the threat actor’s attempts to gain complete access to the victim’s computer in a variety of ways.

“The sample […] uses DLL sideloading to modify and deploy the TeamViewer remote access software onto infected devices,” Kaspersky said. “In simple terms, the attackers place a malicious library in the same folder as TeamViewer, which alters the software’s default behavior and settings, hiding it from the user and providing the attackers with covert remote access.”

The development also follows the discovery of malicious Google ads for RVTools, a popular VMware utility, to deliver a tampered version that’s laced with ThunderShell (aka SMOKEDHAM), a PowerShell-based remote access tool (RAT), underscoring how malvertising remains a persistent and evolving threat.

“ThunderShell, sometimes called SmokedHam, is a publicly available post-exploitation framework designed for red teaming and penetration testing,” Field Effect said. “It provides a command-and-control (C2) environment that allows operators to execute commands on compromised machines through a PowerShell-based agent.”

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Nintendo Switch 2 game-key cards won’t be account-locked
Next Article Vision Pro 2 May Now Be in Production Ahead of Launch Later This Year
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Google Cloud Enhances AI/ML Workflows with Hierarchical Namespace in Cloud Storage
News
Material 3 Expressive: What’s new with Android 16’s visual overhaul?
Gadget
Readers reply: If you were prepping, what would your top five items be?
News
Google will let restaurants highlight specials on their search profiles
News

You Might also Like

Computing

Top 50 AI Tools Transforming Businesses in 2025 |

88 Min Read
Computing

Why I Ditched JavaScript and Built a SaaS Stack With HTMX, Go & Postgres That Just Works | HackerNoon

8 Min Read
Computing

Horabot Malware Targets 6 Latin American Nations Using Invoice-Themed Phishing Emails

4 Min Read
Computing

Oracle Talks Up Its Adaptived Daemon For Linux Systems

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?